Learning, Building,
Deploying
Systems engineering enthusiast and homelab practitioner passionate about infrastructure, automation, and practical technical projects. Welcome to my digital workshop.
About Me
I'm an aspiring cybersecurity professional building practical experience through applied homelab projects and structured training. My lab environment serves as both a learning platform and testing ground where I develop realistic security skills.
From penetration testing and SIEM deployment to Active Directory security and network monitoring, I'm working through the foundational skills needed for a career in cybersecurity. Each project pushes me to understand attack vectors, defensive techniques, and the tools security professionals use daily.
Currently completing the RapidAscent cybersecurity program and pursuing industry certifications while documenting my learning journey and building a portfolio of practical security projects.
Education & Certifications
Continuously expanding my cybersecurity knowledge through structured training programs and industry recognized certifications.
In Progress
Completing comprehensive DoD approved cybersecurity training program with practical job simulations and realistic scenarios. Working through gamified labs that mirror actual Security Operations Center (SOC) environments.
Key focus areas include threat intelligence analysis, open-source intelligence gathering, container security, social engineering defense, and enterprise risk management.
Certified in Cybersecurity, a foundation level security certification covering security principles, network security, and risk management.
Industry standard security certification validating baseline cybersecurity skills and knowledge across various domains.
TryHackMe | Jun 2025 to Present
Completed 100+ hours of practical cybersecurity training through structured, applied labs covering penetration testing, incident response, SOC operations, and cloud security.
- Network & Web Application Penetration Testing with 90% remediation success rate
- Analyzed 25+ simulated attacks examining 5,000+ logs, SIEM alerts, and PCAPs
- Built Splunk dashboards reducing false positives by 33% and boosting detection speed by 40%
- Led 15+ red/blue team scenarios including privilege escalation and lateral movement
- Hardened AWS environments with IAM policies and Zero Trust architecture
- Developed Python and Bash automation scripts improving response time by 60%
- Digital forensics and malware analysis using MITRE ATT&CK framework
Professional Experience
Cybersecurity Analyst Apprenticeship
Remote
- 800+ Hours of Intensive Training: Completed fulltime, immersive cybersecurity program covering SOC operations, threat intelligence, penetration testing, and cloud security across aerospace, finance, energy, and defense sectors
- Governance, Risk & Compliance (GRC): Created and enforced security policies, risk assessments, and incident response protocols, ensuring alignment with NIST 800-53, HIPAA, PCI-DSS, FedRAMP, and FISMA standards
- Network & Systems Security: Fortified Windows and Linux systems by securing Active Directory environments, firewalls, and Zero Trust frameworks, resulting in 40% reduction in attack surface during enterprise simulations
- Threat Hunting & Incident Response: Led threat investigations using MITRE ATT&CK, PCAPs, and SIEM correlation, reducing Mean Time to Detect (MTTD) by 40% and improving initial response playbook execution
- Penetration Testing & Vulnerability Management: Executed vulnerability scans with Nmap and Nessus across diverse environments, identifying critical CVEs and enabling 90% remediation success rate
- Secure Coding & Automation: Developed 10+ custom Python and Bash scripts to streamline log analysis, automate incident workflows, and harden configurations, improving response time by 60%
- SOC Engineering & Threat Response: Monitored, triaged, and responded to 5,000+ simulated threat events in live SOC cyber range, reducing threat dwell time to under 3 hours
- Red & Blue Team Operations: Simulated realistic cyber attacks including ransomware, phishing, and privilege escalation, reducing average threat dwell time from 24+ hours to under 3 hours
CTR (Cryptologic Technician)
Sasebo, Japan; San Diego, CA; Pensacola, FL
- Performed acquisition, analysis, and reporting of advanced communications signals at the intermediate level
- Documented and processed classified materials, ensuring stringent compliance with security protocols and maintaining operational security
- Maintained 100% accountability for all assigned multimillion dollar equipment throughout multiple deployments
- Planned and briefed personnel on mission objectives, enhancing operational efficiency and team coordination
- Coordinated and led training programs in preparation for air operations, fostering team readiness and skill development
In Port Security Reaction Force Team Member
Security Operations
- Completed multiple certification drills to improve antiterrorism readiness shipwide
- Stood hundreds of hours of vigilant watch protecting vital national security assets and critical national infrastructure
- Maintained strict security protocols and access control procedures for sensitive military installations
- Conducted threat assessments and responded to security incidents with rapid decision making under pressure
Cybersecurity Homelab
Built an enterprise grade virtualized security lab for practical experience with offensive security, defensive monitoring, and network architecture. Running on an Acer Predator laptop with nested virtualization.
Security Research & Analysis
Discovered and documented a live SEO poisoning attack exploiting compromised .EDU infrastructure. Traced a multistage attack chain involving domain hijacking, cloaking techniques, and browser based social engineering. Published comprehensive field report detailing the attack methodology, technical analysis, and remediation recommendations.
Virtualization Platform
Set up Proxmox VE as a nested hypervisor inside VMware Workstation. Configured static networking, enabled nested virtualization in BIOS, and optimized resource allocation across multiple security VMs. Managing everything through the web interface on a custom network.
Offensive Security Lab
Deployed Kali Linux with 300+ pre-installed penetration testing tools. Practicing network scanning with Nmap, web app testing with Burp Suite, and exploitation with Metasploit. Working through VulnHub boxes and documenting findings in professional reports.
SIEM & Monitoring
Built Ubuntu Server VM as the foundation for Wazuh SIEM deployment. Configured for log aggregation, security monitoring, and alert creation. Learning to detect attacks in real-time and practice incident response workflows.
Network Architecture
Designed and implemented segmented virtual networks with NAT and bridge configurations. Set up proper routing and DNS resolution across the lab. Learning network security fundamentals and how traffic flows between isolated environments.
Active Directory Lab (In Progress)
Currently deploying Windows Server 2022 as a Domain Controller with Windows 10 clients. Planning to practice Active Directory attacks like Kerberoasting and Bloodhound enumeration, while also implementing defensive techniques and monitoring everything through the SIEM.
Get In Touch
Interested in connecting? Feel free to reach out through any of these channels.